Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions docs/manual/user_guide.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -274,6 +274,14 @@ Ansible, it is advisable to use the playbooks from https://github.com/RedHatOffi

IMPORTANT: The minimum version of Ansible must be at the latest supported version. See https://access.redhat.com/support/policy/updates/ansible-engine for information on the supported Ansible versions.

## Content Notes

### Note on content for Red Hat Virtualization 4

As RHV moves to be based on el8, the contents of `rhv4` will also move to be based on el8.

If you need content for RHV based on el7, use the Red Hat Enterprise Linux 7 (`rhel7`) content.

## Deprecated Content

.Deprecated or Removed Content
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: ocp4,ol7,ol8,rhel6,rhel7,rhel8
prodtype: ocp4,ol7,ol8,rhel6,rhel7,rhel8,rhv4

title: 'Uninstall bind Package'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Enterprise Linux 7,Oracle Linux 7,multi_platform_rhv
# platform = Red Hat Enterprise Linux 7,Oracle Linux 7
# reboot = false
# strategy = restrict
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_wrlinux,Red Hat Enterprise Linux 7,Oracle Linux 7,multi_platform_rhv
# platform = multi_platform_wrlinux,Red Hat Enterprise Linux 7,Oracle Linux 7

# Include source function library.
. /usr/share/scap-security-guide/remediation_functions
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
<platform>multi_platform_wrlinux</platform>
<platform>Red Hat Enterprise Linux 6</platform>
<platform>Red Hat Enterprise Linux 7</platform>
<platform>multi_platform_rhv</platform>
<platform>Oracle Linux 7</platform>
</affected>
<description>Limit the ciphers to those which are FIPS-approved.</description>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: ol7,rhel6,rhel7,rhel8,rhv4,wrlinux1019,wrlinux8
prodtype: ol7,rhel6,rhel7,rhel8,wrlinux1019,wrlinux8

title: 'Use Only FIPS 140-2 Validated Ciphers'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Enterprise Linux 7,Oracle Linux 7,multi_platform_rhv
# platform = Red Hat Enterprise Linux 7,Oracle Linux 7
# reboot = false
# strategy = restrict
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_wrlinux,Red Hat Enterprise Linux 7,Oracle Linux 7,multi_platform_rhv,multi_platform_sle
# platform = multi_platform_wrlinux,Red Hat Enterprise Linux 7,Oracle Linux 7,multi_platform_sle

# Include source function library.
. /usr/share/scap-security-guide/remediation_functions
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@
<platform>multi_platform_wrlinux</platform>
<platform>Red Hat Enterprise Linux 6</platform>
<platform>Red Hat Enterprise Linux 7</platform>
<platform>multi_platform_rhv</platform>
<platform>multi_platform_sle12</platform>
<platform>Oracle Linux 7</platform>
</affected>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: ol7,rhel6,rhel7,rhel8,rhv4,sle12,wrlinux1019
prodtype: ol7,rhel6,rhel7,rhel8,sle12,wrlinux1019

title: 'Use Only FIPS 140-2 Validated MACs'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,rhel6,rhel7,rhv4,wrlinux1019
prodtype: fedora,rhel6,rhel7,wrlinux1019

title: 'Install the screen Package'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ol8,rhel8
prodtype: fedora,ol8,rhel8,rhv4

title: 'Install the tmux Package'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Enterprise Linux 7,multi_platform_fedora,multi_platform_rhv,Oracle Linux 7
# platform = Red Hat Enterprise Linux 7,multi_platform_fedora,Oracle Linux 7
# reboot = false
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = Red Hat Enterprise Linux 7,multi_platform_fedora,multi_platform_rhv,Oracle Linux 7
# platform = Red Hat Enterprise Linux 7,multi_platform_fedora,Oracle Linux 7
# reboot = false
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,6 @@
<affected family="unix">
<platform>Red Hat Enterprise Linux 7</platform>
<platform>multi_platform_fedora</platform>
<platform>multi_platform_rhv</platform>
<platform>Oracle Linux 7</platform>
</affected>
<description>The NSS DB should be set to use opensc library.</description>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ol7,rhel7,rhv4
prodtype: fedora,ol7,rhel7

title: 'Configure NSS DB To Use opensc'

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
. /usr/share/scap-security-guide/remediation_functions
populate var_audispd_remote_server

{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
AUDITCONFIG=/etc/audit/audisp-remote.conf
{{% else %}}
AUDITCONFIG=/etc/audisp/audisp-remote.conf
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<affected family="unix">
<platform>multi_platform_all</platform>
</affected>
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<description>remote_server setting in /etc/audit/audisp-remote.conf is set to a certain IP address or hostname</description>
{{% else %}}
<description>remote_server setting in /etc/audisp/audisp-remote.conf is set to a certain IP address or hostname</description>
Expand All @@ -22,7 +22,7 @@
</ind:textfilecontent54_test>

<ind:textfilecontent54_object id="object_auditd_audispd_configure_remote_server" version="1">
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<ind:filepath>/etc/audit/audisp-remote.conf</ind:filepath>
{{% else %}}
<ind:filepath>/etc/audisp/audisp-remote.conf</ind:filepath>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ description: |-
Configure the audispd plugin to off-load audit records onto a different
system or media from the system being audited.
Set the <tt>remote_server</tt> option in <pre>
{{%- if product in ["rhel8", "fedora", "ol8"] -%}}
{{%- if product in ["rhel8", "fedora", "ol8", "rhv4"] -%}}
/etc/audit/audisp-remote.conf
{{%- else -%}}
/etc/audisp/audisp-remote.conf
Expand Down Expand Up @@ -41,7 +41,7 @@ ocil_clause: 'audispd is not sending logs to a remote system'
ocil: |-
To verify the audispd plugin off-loads audit records onto a different system or
media from the system being audited, run the following command:
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<pre>$ sudo grep -i remote_server /etc/audit/audisp-remote.conf</pre>
{{% else %}}
<pre>$ sudo grep -i remote_server /etc/audisp/audisp-remote.conf</pre>
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# platform = multi_platform_wrlinux,multi_platform_all
. /usr/share/scap-security-guide/remediation_functions

{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
AUDISP_REMOTE_CONFIG="/etc/audit/audisp-remote.conf"
option="^transport"
value="KRB5"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<affected family="unix">
<platform>multi_platform_all</platform>
</affected>
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<description>transport setting in /etc/audit/audisp-remote.conf is set to 'KRB5'</description>
{{% else %}}
<description>enable_krb5 setting in /etc/audisp/audisp-remote.conf is set to 'yes'</description>
Expand All @@ -23,14 +23,14 @@
</ind:textfilecontent54_test>

<ind:textfilecontent54_object id="object_auditd_audispd_encrypt_sent_records" version="1">
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<ind:filepath>/etc/audit/audisp-remote.conf</ind:filepath>
{{% else %}}
<ind:filepath>/etc/audisp/audisp-remote.conf</ind:filepath>
{{% endif %}}
<!-- Allow only space (exactly) as delimiter -->
<!-- Require at least one space before and after the equal sign -->
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<ind:pattern operation="pattern match">^[ ]*transport[ ]+=[ ]+KRB5[ ]*$</ind:pattern>
{{% else %}}
<ind:pattern operation="pattern match">^[ ]*enable_krb5[ ]+=[ ]+yes[ ]*$</ind:pattern>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ title: 'Encrypt Audit Records Sent With audispd Plugin'
description: |-
Configure the operating system to encrypt the transfer of off-loaded audit
records onto a different system or media from the system being audited.
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
Set the <tt>transport</tt> option in <pre>/etc/audit/audisp-remote.conf</pre>
to <tt>KRB5</tt>.
{{% else %}}
Expand Down Expand Up @@ -39,7 +39,7 @@ ocil_clause: 'audispd is not encrypting audit records when sent over the network
ocil: |-
To verify the audispd plugin encrypts audit records off-loaded onto a different
system or media from the system being audited, run the following command:
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<pre>$ sudo grep -i transport /etc/audit/audisp-remote.conf</pre>
The output should return the following:
<pre>transport = KRB5</pre>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@

- name: enable syslog plugin
lineinfile:
{{% if product in ["rhel8", "fedora", "ol8"] -%}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] -%}}
dest: /etc/audit/plugins.d/syslog.conf
{{%- else -%}}
dest: /etc/audisp/plugins.d/syslog.conf
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
. /usr/share/scap-security-guide/remediation_functions
var_syslog_active="yes"

{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
AUDISP_SYSLOGCONFIG=/etc/audit/plugins.d/syslog.conf
{{% else %}}
AUDISP_SYSLOGCONFIG=/etc/audisp/plugins.d/syslog.conf
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
<affected family="unix">
<platform>multi_platform_all</platform>
</affected>
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<description>active setting in /etc/audit/plugins.d/syslog.conf is set to 'yes'</description>
{{% else %}}
<description>active setting in /etc/audisp/plugins.d/syslog.conf is set to 'yes'</description>
Expand All @@ -23,7 +23,7 @@
</ind:textfilecontent54_test>

<ind:textfilecontent54_object id="object_auditd_audispd_syslog_plugin_activated" version="1">
{{% if product in ["rhel8", "fedora", "ol8"] %}}
{{% if product in ["rhel8", "fedora", "ol8", "rhv4"] %}}
<ind:filepath>/etc/audit/plugins.d/syslog.conf</ind:filepath>
{{% else %}}
<ind:filepath>/etc/audisp/plugins.d/syslog.conf</ind:filepath>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ description: |-
To configure the <tt>auditd</tt> service to use the
<tt>syslog</tt> plug-in of the <tt>audispd</tt> audit event multiplexor, set
the <tt>active</tt> line in <tt>
{{%- if product in ["rhel8", "fedora", "ol8"] -%}}
{{%- if product in ["rhel8", "fedora", "ol8", "rhv4"] -%}}
/etc/audit/plugins.d/syslog.conf
{{%- else -%}}
/etc/audisp/plugins.d/syslog.conf
Expand Down Expand Up @@ -51,7 +51,7 @@ ocil_clause: 'it is not activated'

ocil: |-
To verify the audispd's syslog plugin is active, run the following command:
{{% if product in ["rhel8", "fedora"] %}}
{{% if product in ["rhel8", "fedora", "rhv4"] %}}
<pre>$ sudo grep active /etc/audit/plugins.d/syslog.conf</pre>
{{% else %}}
<pre>$ sudo grep active /etc/audisp/plugins.d/syslog.conf</pre>
Expand Down
4 changes: 2 additions & 2 deletions linux_os/guide/system/auditing/grub2_audit_argument/rule.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ description: |-
To ensure all processes can be audited, even those which start
prior to the audit daemon, add the argument <tt>audit=1</tt> to the default
GRUB 2 command line for the Linux operating system in
{{% if product in ["rhel7", "ol7", "rhv4"] %}}
{{% if product in ["rhel7", "ol7"] %}}
<tt>/etc/default/grub</tt>, so that the line looks similar to
<pre>GRUB_CMDLINE_LINUX="... audit=1 ..."</pre>
In case the <tt>GRUB_DISABLE_RECOVERY</tt> is set to true, then the parameter should be added to the <tt>GRUB_CMDLINE_LINUX_DEFAULT</tt> instead.
Expand Down Expand Up @@ -50,7 +50,7 @@ references:
ocil_clause: 'auditing is not enabled at boot time'

ocil: |-
{{% if product in ["rhel7", "ol7", "rhv4"] %}}
{{% if product in ["rhel7", "ol7"] %}}
Inspect the form of default GRUB 2 command line for the Linux operating system
in <tt>/etc/default/grub</tt>. If it includes <tt>audit=1</tt>, then auditing
is enabled at boot time.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol7,ol8,rhel6,rhel7,rhel8
prodtype: fedora,ocp4,ol7,ol8,rhel6,rhel7,rhel8,rhv4

title: 'Install libreswan Package'

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ description: |-
To disable IPv6 protocol support in the Linux kernel,
add the argument <tt>ipv6.disable=1</tt> to the default
GRUB2 command line for the Linux operating system in
{{% if product in ["rhel7", "ol7", "rhv4"] %}}
{{% if product in ["rhel7", "ol7"] %}}
<tt>/etc/default/grub</tt>, so that the line looks similar to
<pre>GRUB_CMDLINE_LINUX="... ipv6.disable=1 ..."</pre>
In case the <tt>GRUB_DISABLE_RECOVERY</tt> is set to true, then the parameter should be added to the <tt>GRUB_CMDLINE_LINUX_DEFAULT</tt> instead.
Expand Down Expand Up @@ -39,7 +39,7 @@ references:
ocil_clause: 'IPv6 is not disabled'

ocil: |-
{{% if product in ["rhel7", "ol7", "rhv4"] %}}
{{% if product in ["rhel7", "ol7"] %}}
Inspect the form of default GRUB2 command line for the Linux operating system
in <tt>/etc/default/grub</tt>. Check if it includes <tt>ipv6.disable=1</tt>.
First check if the GRUB recovery is enabled:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4

function remediate_bind_crypto_policy() {
CONFIG_FILE="/etc/named.conf"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol8,rhel8
prodtype: fedora,ocp4,ol8,rhel8,rhv4

title: 'Configure BIND to use System Crypto Policy'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4
# reboot = false
# strategy = restrict
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4

# include remediation functions library
. /usr/share/scap-security-guide/remediation_functions
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol8,rhel8
prodtype: fedora,ocp4,ol8,rhel8,rhv4

title: 'Configure System Cryptography Policy'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4
# reboot = true
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4
# reboot = true
# strategy = configure
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol8,rhel8
prodtype: fedora,ocp4,ol8,rhel8,rhv4

title: 'Configure Kerberos to use System Crypto Policy'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4
# reboot = false
# strategy = restrict
# complexity = low
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4

function remediate_libreswan_crypto_policy() {
CONFIG_FILE="/etc/ipsec.conf"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
documentation_complete: true

prodtype: fedora,ocp4,ol8,rhel8
prodtype: fedora,ocp4,ol8,rhel8,rhv4

title: 'Configure Libreswan to use System Crypto Policy'

Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8
# platform = multi_platform_fedora,Red Hat Enterprise Linux 8,Oracle Linux 8,Red Hat Virtualization 4
# reboot = false
# strategy = unknown
# complexity = low
Expand Down
Loading